This paper studies the fairness with which competing flows share the channel in ad hoc networks using collision avoidance protocols. It is shown that the required multihop coordi...
Packet-level discrete-event network simulators use an event to model the movement of each packet in the network. This results in accurate models, but requires that many events are...
Cameron Kiddle, Rob Simmonds, Carey L. Williamson,...
Abstract. We present a 3D geometric flow designed to evolve in Diffusion Tensor Magnetic Resonance Images(DT-MRI) along fiber tracts by measuring the diffusive similarity betwe...
Lisa Jonasson, Patric Hagmann, Xavier Bresson, Ret...
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
We describe a general-purpose distributed system capable of traceback of malicious flow trajectories in the wide area despite possible source IP spoofing. Our system requires th...